ntdll: try to not raise exceptions when checking for atl thunks

Alexandre Julliard julliard at winehq.org
Wed Jun 16 04:37:28 CDT 2010


Markus Amsler <markus.amsler at oribi.org> writes:

> + * Windows checks the following conditions before emulating an ATL thunk:
> + *  - DEP policy allows emulating
> + *  - thunk has memory type MEM_PRIVATE and is readable
> + *  - jmp func is executable
> + *  - thunk signature (movl, jmp) matches
> + *  - a "secret" flag is set:
> + *    The flag gets set before calling WndProc and cleared after WndProc
> + *    or a thunk was emulated.
> + *    In Windows XP SP 3 this flag is located at TEB+0xfb4.
>   */

Where does that information come from?

-- 
Alexandre Julliard
julliard at winehq.org



More information about the wine-devel mailing list